This page is concerned with the holders of the extinct title Earl of Douglas and the preceding feudal barons of Douglas, South Lanarkshire. The title was created in
Name / Title
Company / Classification
Phones & Addresses
Douglas Earl Principal
Significant Digital LLC Business Services at Non-Commercial Site
33 S Palisades Dr, Orem, UT 84097
Douglas B. Earl M
Earl & Earl Technologies, LLC
2794 S Grass Vly Dr, Saint George, UT 84790 9061 Cyn Hts Dr, Pleasant Grove, UT 84062
Criminal Law Adoption Car Accidents Child Support Custody & Visitation Divorce Drugs Family Law Federal Juvenile Crimes Juvenile Law Landlord/Tenant Parole & Probation Personal Injury Probate & Estate Administration Real Estate Law Slip and Fall Traffic Violations Wills Support Protection from Abuse Domestic Violence Guns Wrongful Death Criminal Law Motor Vehicle Accident White Collar Crimes
Joseph Andrew Mellmer - Salt Lake City UT, US Russell T. Young - Pleasant Grove UT, US Arn D. Perkins - Alpine UT, US John M. Robertson - Pleasant Grove UT, US Jeffrey Neil Sabin - Spanish Fork UT, US Michael C. McDonald - Orem UT, US Douglas Phillips - Orem UT, US Robert Michael Sheridan - Oak Hill VA, US Nadeem Ahmad Nazeer - Provo UT, US DeeAnne Barker Higley - Provo UT, US Stephen R. Carter - Spanish Fork UT, US Douglas G. Earl - Orem UT, US Kelly E. Sonderegger - Santaquin UT, US Daniel T. Ferguson - Orem UT, US Farrell Lynn Brough - West Jordan UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 17/00
US Classification:
7071041, 707101, 707102, 707103 R, 713182
Abstract:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
Tammy Anita Green - Provo UT, US Lloyd Leon Burch - Payson UT, US Stephen R. Carter - Spanish Fork UT, US Douglas G. Earl - Orem UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 9/32
US Classification:
726 27
Abstract:
Techniques are provided for allocating resources over a network. A resource consumer requests access to a resource over a network. As part of that request, the resource consumer acquires information that permits it to securely communicate with a resource provider. The resource provider controls the resource and once satisfied with the security of a request from a resource consumer allocates the resource for access by the resource consumer.
Joseph Andrew Mellmer - Salt Lake City UT, US Russell T. Young - Pleasant Grove UT, US Arn D. Perkins - Alpine UT, US John M. Robertson - Pleasant Grove UT, US Jeffrey Neil Sabin - Spanish Fork UT, US Michael C. McDonald - Orem UT, US Douglas Phillips - Orem UT, US Robert Michael Sheridan - Oak Hill VA, US Nadeem Ahmad Nazeer - Orem UT, US DeeAnne Barker Higley - Provo UT, US Stephen R. Carter - Spanish Fork UT, US Douglas G. Earl - Orem UT, US Kelly E. Sonderegger - Santaquin UT, US Daniel T. Ferguson - Orem UT, US Farrell Lynn Brough - West Jordan UT, US
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
G06F 7/00 G06F 17/30
US Classification:
707737, 707740
Abstract:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
Joseph Andrew Mellmer - Salt Lake City UT, US Russell T. Young - Pleasant Grove UT, US Arn D. Perkins - Alpine UT, US John M. Robertson - Pleasant Grove UT, US Jeffrey Neil Sabin - Spanish Fork UT, US Michael C. McDonald - Orem UT, US Douglas Phillips - Orem UT, US Robert Michael Sheridan - Oak Hill VA, US Nadeem Ahmad Nazeer - Orem UT, US DeeAnne Barker Higley - Provo UT, US Stephen R. Carter - Spanish Fork UT, US Douglas G. Earl - Orem UT, US Kelly E. Sonderegger - Santaquin UT, US Daniel T. Ferguson - Orem UT, US Farrell Lynn Brough - West Jordan UT, US
Assignee:
EMC Corporation - Hopkinton MA
International Classification:
G06F 7/00 G06F 17/30
US Classification:
707783, 707784, 707785
Abstract:
A basic architecture for managing digital identity information in a network such as the World Wide Web is provided. A user of the architecture can organize his or her information into one or more profiles which reflect the nature of different relationships between the user and other entities, and grant or deny each entity access to a given profile. Various enhancements which may be provided through the architecture are also described, including tools for filtering email, controlling access to user web pages, locating other users and making one's own location known, browsing or mailing anonymously, filling in web forms automatically with information already provided once by hand, logging in automatically, securely logging in to multiple sites with a single password and doing so from any machine on the network, and other enhancements.
Multiple Security Access Mechanisms For A Single Identifier
Techniques for using multiple security access mechanisms for a single identifier are presented. A single identifier is permitted to be associated with multiple authentication secrets. The single identifier resolves to a particular identity in response to the particular authentication secret presented with the single identifier. Moreover, in an embodiment, any resolved identity may have a variety of attributes automatically set for a particular communication session, such as role, access rights, etc.
Jeremy Ray Brown - Orem UT, US Jason Allen Sabin - Lehi UT, US Nathaniel Brent Kranendonk - Springville UT, US Kal A. Larsen - Springville UT, US Lloyd Leon Burch - Payson UT, US Douglas Garry Earl - Orem UT, US
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
Techniques for federated credential reset are presented. A principal requests a credential reset with a first service. The first service provides a link to a third party service previously selected by the principal. The principal separately authenticates to the third party service and cause the third party service to send a federated token to the first service. When the federated token is received by the first service, the first service permits the principal to reset an original credential to a new credential for purposes of accessing the first service.
Jeremy Ray Brown - Orem UT, US Jason Allen Sabin - Lehi UT, US Lloyd Leon Burch - Payson UT, US Douglas Garry Earl - Orem UT, US
International Classification:
G06F 21/00
US Classification:
726 1, 726 7
Abstract:
Techniques for controlling authentication are provided. An enterprise injects a control and/or audit manager into the enterprise environment to control and in some instances audit third-party authentication services. A user attempts to access a resource that uses a third-party authentication service. The attempt is intercepted and third-party authentication handled by the manager. After authentication, a session between the user and the resource is established during which auditing services may be enacted. The user authenticates to the enterprise environment and the manager provides authentication for the user to the resource via the third-party authentication service.
Client Inherited Functionally Derived From A Proxy Topology Where Each Proxy Is Independently Configured
A system and method efficiently provides services offered by proxy servers to client computers coupled to a network. The system comprises a proxy server interface configured to expose the services within a web brower executing on a client computer. The services available to the client are dependent upon the topology of the network coupling the client to the proxy servers and the access rights of the client with respect to the services. The invention further provides an efficient method that allows clients to inherit functionality from the proxy servers as a function of the network topology and access rights.
Youtube
Junior Dread Douglas Earl n Rafael Senegal Ja...
Jamming at Fenix Studio during the record session of "De Senzala em Fa...